-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 3.7.0, <= 3.7.2 | 3.7.3 |
The vulnerability stems from user email and other fields being output without proper escaping, enabling reflected XSS. The GitHub commit patches these issues by adding the s() function to escape user-controlled data. The affected functions are those that previously handled user data (e.g., email, extra fields) without escaping. Each listed function was modified in the commit to include escaping, confirming they were vulnerable. High confidence is assigned because the commit directly addresses XSS by introducing sanitization in these specific contexts.